Today in this article, we will be learning about the Active Directory Pentesting Lab Setup. Active Directory is Microsoft’s directory-based identity-related service developed for Windows
In this guide, we explore DNScat2 Application Layer Command and Control, a method for using DNS to establish covert communication channels. By setting up DNScat2,
In this part of our lab series, we continue exploring AlienVault End User Devices Integration by setting up Windows and Linux endpoints for centralized monitoring.
In this guide, we delve into the SIEM Lab Setup AlienVault, focusing on deploying AlienVault OSSIM to monitor system security events, assess vulnerabilities, and perform
In this article, we will learn the technique of Defense Evasion using the PowerShell Empire. PowerShell Empire is one of my favourite Post Exploitation tools
As you know, docking services are booming, docking container attacks are also on the rise. But this post will illustrate how the intruder is trying
In this guide on SIEM Windows Client Monitoring with Splunk, we focus on setting up a Splunk Universal Forwarder on a Windows machine. This setup
Have you ever heard about your critical data being exported somewhere else without your knowledge? Data exfiltration is a method of breaching the security and
Alternate Data Stream is an artifact of New Technology File system (NTFS) which was introduced by Windows. It was traditionally introduced so that it could